File name:

SWIFT.exe

Full analysis: https://app.any.run/tasks/171cd5fe-d95c-4c0c-a812-3fb2aa5f98b5
Verdict: Malicious activity
Threats:

GuLoader is an advanced downloader written in shellcode. It’s used by criminals to distribute other malware, notably trojans, on a large scale. It’s infamous for using anti-detection and anti-analysis capabilities.

Analysis date: September 17, 2024, 15:26:46
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
guloader
loader
snake
keylogger
evasion
telegram
ims-api
generic
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

4020D471ECF32797FCDA82EA54E1382C

SHA1:

D7D55457719420C47915100803F9F9F771F73298

SHA256:

29E04BFF32F8CE165D5E76115BEEE411445727CA5969BD79298174DD3569AA25

SSDEEP:

24576:3e/ZxC24RbpwNLV+O5WXn1OZm/Kyz/w05PolRz5DU+gOE+8i72ftAM1mpQ8:3e/ZxC24RbpwNR+6WX1OZm/jz/v5Polt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SNAKE has been detected (YARA)

      • wabmig.exe (PID: 6576)
  • SUSPICIOUS

    • Possible usage of Discord/Telegram API has been detected (YARA)

      • wabmig.exe (PID: 6576)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

SnakeKeylogger

(PID) Process(6576) wabmig.exe
Keys
DES6fc98cd68a1aab8b
Options
Telegram Bot Token6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww
Telegram Chat ID7220818658

ims-api

(PID) Process(6576) wabmig.exe
Telegram-Tokens (1)6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww
Telegram-Info-Links
6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww
Get info about bothttps://api.telegram.org/bot6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww/getMe
Get incoming updateshttps://api.telegram.org/bot6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww/getUpdates
Get webhookhttps://api.telegram.org/bot6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww/getWebhookInfo
Delete webhookhttps://api.telegram.org/bot6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww/deleteWebhook
Drop incoming updateshttps://api.telegram.org/bot6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww/deleteWebhook?drop_pending_updates=true
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:09:25 21:57:46+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 27136
InitializedDataSize: 186880
UninitializedDataSize: 2048
EntryPoint: 0x352d
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.2.0.0
ProductVersionNumber: 1.2.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: specifikationen
FileVersion: 1.2.0.0
LegalCopyright: cyclohexene
OriginalFileName: afsyngningens uopretteliges.exe
ProductName: nog receiver madrih
ProductVersion: 1.2.0.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
4
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #GULOADER swift.exe no specs powershell.exe no specs conhost.exe no specs #SNAKE wabmig.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
752"C:\Users\admin\AppData\Local\Temp\SWIFT.exe" C:\Users\admin\AppData\Local\Temp\SWIFT.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
2
Version:
1.2.0.0
Modules
Images
c:\users\admin\appdata\local\temp\swift.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2024"powershell.exe" -windowstyle hidden "$Nawabship=Get-Content 'C:\Users\admin\AppData\Local\sultestrejkerne\monopolizer\Nongraded.Uns';$Gldsformels=$Nawabship.SubString(57386,3);.$Gldsformels($Nawabship)C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSWIFT.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2360\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6576"C:\Program Files (x86)\windows mail\wabmig.exe"C:\Program Files (x86)\Windows Mail\wabmig.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) Contacts Import Tool
Version:
10.0.19041.3636 (WinBuild.160101.0800)
SnakeKeylogger
(PID) Process(6576) wabmig.exe
Keys
DES6fc98cd68a1aab8b
Options
Telegram Bot Token6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww
Telegram Chat ID7220818658
ims-api
(PID) Process(6576) wabmig.exe
Telegram-Tokens (1)6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww
Telegram-Info-Links
6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww
Get info about bothttps://api.telegram.org/bot6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww/getMe
Get incoming updateshttps://api.telegram.org/bot6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww/getUpdates
Get webhookhttps://api.telegram.org/bot6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww/getWebhookInfo
Delete webhookhttps://api.telegram.org/bot6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww/deleteWebhook
Drop incoming updateshttps://api.telegram.org/bot6497814516:AAHas9Bu_Hsm8fSF5_kPM60KYlhgUBs0vww/deleteWebhook?drop_pending_updates=true
Total events
4 979
Read events
4 979
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
13
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
752SWIFT.exeC:\Users\admin\AppData\Local\sultestrejkerne\monopolizer\Hejdi101.txttext
MD5:97C1425B44892639CE7E17137CD493DB
SHA256:1F3D3CEEBA917C2702948C39F1985AF540C88942DEF19692B2EAE1BF58FC9706
752SWIFT.exeC:\Users\admin\AppData\Local\sultestrejkerne\monopolizer\Nongraded.Unstext
MD5:0E554FC231893252BD25822E78520527
SHA256:D659890380F2A2FF1C4F8D67ECCA5831E1A924F16259BEEE8E0C9C7F820548BB
752SWIFT.exeC:\Users\admin\AppData\Local\sultestrejkerne\monopolizer\uncivilizables.nonbinary
MD5:C810E73FA57C1B5CE7833C60242B98FB
SHA256:14D41D91A38E7DCCADD1CED5E978B560768D334ABD5C26203A043AC8B525E346
752SWIFT.exeC:\Users\admin\AppData\Local\sultestrejkerne\monopolizer\Forlngerledningen.stabinary
MD5:3E294B3ADE8E72B51704728030F85093
SHA256:797219FCAB58E03473477A2288C628F2D0BAADB11FBB5F2F55D251A10F66352A
752SWIFT.exeC:\Users\admin\AppData\Local\sultestrejkerne\monopolizer\Openest.Stybinary
MD5:3B4C43774F485F3B3C98122C30E26957
SHA256:B75A892C958664416C32EC5C771540FC47C66BBAA95A79C6DA118A56DF2C49CD
6576wabmig.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6DA548C7E5915679F87E910D6581DEF1_058F778FC8346DE378B15A5652BAADD9binary
MD5:F0A7D2E655F3D059D27809F17C1495DF
SHA256:407AD683B252C1B82DE6A8DF25020322D114706F1CFDF3B9F870D64CECF51A57
2024powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCachebinary
MD5:8E7D26D71A1CAF822C338431F0651251
SHA256:495E7C4588626236C39124CCE568968E874BEDA950319BA391665B43DE111084
6576wabmig.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_058F778FC8346DE378B15A5652BAADD9binary
MD5:E38FC49A17CD92527B3F68ABC479187A
SHA256:9C892D90F818B062A94D70BE4FB2131A919E830563BAB1497B9B562AB92E76DA
2024powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_hzcpjxas.ff5.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6576wabmig.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:79916033FBB0AE3E98435F6356476DC9
SHA256:4CF1BF072C43ADC0B37EA57D60BBD7BFAF444F75A2537D7AE77701DB06747E97
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
42
DNS requests
27
Threats
18

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6756
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6756
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
1964
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
172.217.18.3:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDmcMw%2Fo03sIxABiVt5eEgl
unknown
whitelisted
GET
200
172.217.16.195:80
http://c.pki.goog/r/r1.crl
unknown
whitelisted
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
GET
200
172.217.18.3:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDbEwnphZvrGArz%2BV5lisDz
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
4492
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
6328
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
6756
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
1964
svchost.exe
40.126.32.134:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1964
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.78
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
example.org
  • 93.184.215.14
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
login.live.com
  • 40.126.32.134
  • 40.126.32.133
  • 20.190.160.17
  • 40.126.32.76
  • 40.126.32.74
  • 40.126.32.72
  • 20.190.160.20
  • 20.190.160.14
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 13.85.23.86
whitelisted

Threats

PID
Process
Class
Message
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Query (checkip .dyndns .org)
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
Misc activity
ET INFO External IP Address Lookup Domain in DNS Lookup (reallyfreegeoip .org)
Misc activity
ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
Device Retrieving External IP Address Detected
ET INFO 404/Snake/Matiex Keylogger Style External IP Check
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup - checkip.dyndns.org
No debug info